CVE-2025-61917: n8n: Info Disclosure leaks sensitive data
HIGHn8n's task runner leaks process memory to untrusted code nodes — any authenticated user with workflow edit access can read API keys, tokens, and secrets from other concurrent or recent workflow executions. If you run n8n for AI agent orchestration, this is a credential theft risk regardless of the 7.7 score: the Changed scope (S:C) means one low-privilege account can drain secrets from the entire platform. Patch to 1.114.3 immediately and rotate all credentials processed through n8n since version 1.65.0.
Risk Assessment
High operational risk for organizations using n8n as an AI agent orchestrator. The CVSS scope change reflects cross-workflow memory boundary impact: an attacker with only low privileges in one workflow context can read residual memory from other workflows. In AI-heavy deployments, n8n routinely processes LLM API keys (OpenAI, Anthropic, Azure AI), database credentials, OAuth tokens, and webhook secrets — all prime targets. No special tooling or AI knowledge required; Buffer.allocUnsafe exploitation is trivial and well-documented in Node.js security literature.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | — | No patch |
Do you use n8n? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
PATCH NOW
upgrade n8n to 1.114.3+ — this is the only full remediation.
-
If patching is delayed: restrict Code node permissions to admin-only users in n8n settings to limit the attack surface.
-
ROTATE CREDENTIALS
treat all API keys, OAuth tokens, DB passwords, and webhook secrets processed by n8n workflows since version 1.65.0 as potentially compromised.
-
Audit access logs for anomalous Code node creation, especially by non-admin users, or unusual outbound HTTP requests from workflow executions.
-
For hosted/cloud n8n: verify your managed version is updated and contact your vendor if uncertain.
-
Detection signal: alert on new Code nodes created by low-privilege accounts that allocate large Buffers or make unexpected external HTTP calls.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-61917?
n8n's task runner leaks process memory to untrusted code nodes — any authenticated user with workflow edit access can read API keys, tokens, and secrets from other concurrent or recent workflow executions. If you run n8n for AI agent orchestration, this is a credential theft risk regardless of the 7.7 score: the Changed scope (S:C) means one low-privilege account can drain secrets from the entire platform. Patch to 1.114.3 immediately and rotate all credentials processed through n8n since version 1.65.0.
Is CVE-2025-61917 actively exploited?
No confirmed active exploitation of CVE-2025-61917 has been reported, but organizations should still patch proactively.
How to fix CVE-2025-61917?
1. PATCH NOW: upgrade n8n to 1.114.3+ — this is the only full remediation. 2. If patching is delayed: restrict Code node permissions to admin-only users in n8n settings to limit the attack surface. 3. ROTATE CREDENTIALS: treat all API keys, OAuth tokens, DB passwords, and webhook secrets processed by n8n workflows since version 1.65.0 as potentially compromised. 4. Audit access logs for anomalous Code node creation, especially by non-admin users, or unusual outbound HTTP requests from workflow executions. 5. For hosted/cloud n8n: verify your managed version is updated and contact your vendor if uncertain. 6. Detection signal: alert on new Code nodes created by low-privilege accounts that allocate large Buffers or make unexpected external HTTP calls.
What systems are affected by CVE-2025-61917?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, model serving, data pipelines, API integration workflows, RAG pipelines.
What is the CVSS score for CVE-2025-61917?
CVE-2025-61917 has a CVSS v3.1 base score of 7.7 (HIGH). The EPSS exploitation probability is 0.02%.
Technical Details
NVD Description
n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3.
Exploitation Scenario
An attacker with a standard n8n user account (obtained via phishing a team member or exploiting a shared workspace) creates a new workflow containing a Code node with: const buf = Buffer.allocUnsafe(65536); followed by an HTTP request exfiltrating the raw buffer contents to an attacker-controlled endpoint. By scheduling this workflow to run repeatedly during peak usage hours, the attacker captures memory residue from concurrent executions: OpenAI API keys from LLM orchestration nodes, PostgreSQL connection strings from database query steps, Slack tokens from notification workflows, and Stripe keys from payment automation. Each captured credential enables lateral movement into downstream systems — all from a single low-privilege n8n account with no AI/ML knowledge required.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27494 9.9 n8n: security flaw enables exploitation
Same package: n8n CVE-2026-27495 9.9 n8n: Code Injection enables RCE
Same package: n8n
AI Threat Alert